Software-defined wireless networking opportunities and challenges for Internet-of-Things: A review K Sood, S Yu, Y Xiang IEEE Internet of Things Journal 3 (4), 453-463, 2015 | 264 | 2015 |
Cooperative edge caching: A multi-agent deep learning based approach Y Zhang, B Feng, W Quan, A Tian, K Sood, Y Lin, H Zhang IEEE Access 8, 133212-133224, 2020 | 66 | 2020 |
Performance Analysis of Software-Defined Network Switch Using Model K Sood, S Yu, Y Xiang IEEE Communications Letters 20 (12), 2522-2525, 2016 | 66 | 2016 |
Alleviating heterogeneity in SDN-IoT networks to maintain QoS and enhance security K Sood, KK Karmakar, S Yu, V Varadharajan, SR Pokhrel, Y Xiang IEEE Internet of Things Journal 7 (7), 5964-5975, 2019 | 47 | 2019 |
Dynamic access point association using software defined networking K Sood, S Liu, S Yu, Y Xiang 2015 International Telecommunication Networks and Applications Conference …, 2015 | 39 | 2015 |
The controller placement problem or the controller selection problem? K Sood, Y Xiang Journal of communications and information networks 2, 1-9, 2017 | 38 | 2017 |
RPPTD: robust privacy-preserving truth discovery scheme J Chen, Y Liu, Y Xiang, K Sood IEEE systems journal 16 (3), 4525-4531, 2021 | 36 | 2021 |
Adaptive service function chaining mappings in 5G using deep Q-learning G Li, B Feng, H Zhou, Y Zhang, K Sood, S Yu Computer Communications 152, 305-315, 2020 | 35 | 2020 |
Efficient federated DRL-based cooperative caching for mobile edge networks A Tian, B Feng, H Zhou, Y Huang, K Sood, S Yu, H Zhang IEEE Transactions on Network and Service Management 20 (1), 246-260, 2022 | 30 | 2022 |
Towards spoofing resistant next generation IoT networks MR Nosouhi, K Sood, M Grobler, R Doss IEEE Transactions on Information Forensics and Security 17, 1669-1683, 2022 | 30 | 2022 |
Enabling machine learning with service function chaining for security enhancement at 5G edges B Feng, H Zhou, G Li, Y Zhang, K Sood, S Yu IEEE Network 35 (5), 196-201, 2021 | 30 | 2021 |
Pasport: A secure and private location proof generation and verification framework MR Nosouhi, K Sood, S Yu, M Grobler, J Zhang IEEE Transactions on Computational Social Systems 7 (2), 293-307, 2020 | 30 | 2020 |
Privacy issues in social networks and analysis: a comprehensive survey VVH Pham, S Yu, K Sood, L Cui IET networks 7 (2), 74-84, 2018 | 29 | 2018 |
Intrusion detection scheme with dimensionality reduction in next generation networks K Sood, MR Nosouhi, DDN Nguyen, F Jiang, M Chowdhury, R Doss IEEE Transactions on Information Forensics and Security 18, 965-979, 2023 | 28 | 2023 |
ERM: An accurate approach to detect DDoS attacks using entropy rate measurement L Zhou, K Sood, Y Xiang IEEE Communications Letters 23 (10), 1700-1703, 2019 | 26 | 2019 |
A general QoS aware flow-balancing and resource management scheme in distributed software-defined networks K Sood, S Yu, Y Xiang, H Cheng IEEE access 4, 7176-7185, 2016 | 24 | 2016 |
A bytecode-based approach for smart contract classification C Shi, Y Xiang, J Yu, L Gao, K Sood, RRM Doss 2022 IEEE International Conference on Software Analysis, Evolution and …, 2022 | 23 | 2022 |
Reliability-aware virtual network function placement in carrier networks L Fang, X Zhang, K Sood, Y Wang, S Yu Journal of Network and Computer Applications 154, 102536, 2020 | 23 | 2020 |
An effective and feasible traceback scheme in mobile internet environment S Yu, K Sood, Y Xiang IEEE communications letters 18 (11), 1911-1914, 2014 | 22 | 2014 |
UCoin: An efficient privacy preserving scheme for cryptocurrencies MR Nosouhi, S Yu, K Sood, M Grobler, R Jurdak, A Dorri, S Shen IEEE Transactions on Dependable and Secure Computing 20 (1), 242-255, 2021 | 21 | 2021 |